61,749 research outputs found
Socially Trusted Collaborative Edge Computing in Ultra Dense Networks
Small cell base stations (SBSs) endowed with cloud-like computing
capabilities are considered as a key enabler of edge computing (EC), which
provides ultra-low latency and location-awareness for a variety of emerging
mobile applications and the Internet of Things. However, due to the limited
computation resources of an individual SBS, providing computation services of
high quality to its users faces significant challenges when it is overloaded
with an excessive amount of computation workload. In this paper, we propose
collaborative edge computing among SBSs by forming SBS coalitions to share
computation resources with each other, thereby accommodating more computation
workload in the edge system and reducing reliance on the remote cloud. A novel
SBS coalition formation algorithm is developed based on the coalitional game
theory to cope with various new challenges in small-cell-based edge systems,
including the co-provisioning of radio access and computing services,
cooperation incentives, and potential security risks. To address these
challenges, the proposed method (1) allows collaboration at both the user-SBS
association stage and the SBS peer offloading stage by exploiting the ultra
dense deployment of SBSs, (2) develops a payment-based incentive mechanism that
implements proportionally fair utility division to form stable SBS coalitions,
and (3) builds a social trust network for managing security risks among SBSs
due to collaboration. Systematic simulations in practical scenarios are carried
out to evaluate the efficacy and performance of the proposed method, which
shows that tremendous edge computing performance improvement can be achieved.Comment: arXiv admin note: text overlap with arXiv:1010.4501 by other author
Tipping the scales: ambidexterity practices on e-HRM projects
Purpose: We examine and conceptualise the ways in which a balance can be achieved between optimising the efficiency and effectiveness of electronic HRM (e-HRM) systems for human resource management (HRM) and enabling innovation to occur during the system implementation.
Design/methodology/approach: An intepretive case study of a UK local authority e-HRM system implementation is examined using the notion of ambidexterity as an analytical device. Ambidexterity relates to how an organisation develops the ability to operate efficiently in the now, while at the same time being able to adapt to environmental changes around and ahead of them in order to grow into the future.
Findings: As an intra-organisational capability, ambidexterity is found to derive from the simultaneous interplay and balancing of dual capabilities: exploitation and exploration.. E-HRM exploitation concerned the capability to generate new knowledge with innovatory effects, created through the everyday practices performed by practitioners at all levels in the organisation. E-HRM exploration, rather than being a purposeful act, was found to be an accidental consequence of engaging in exploitation to maintain the status quo.
Originality/value: There is a lack of detailed investigation of how organisations actually achieve ambidexterity, particularly in three under-researched areas: ambidexterity in the public sector, at HR functional level and e-HRM systems implementation. Bundling these three areas into an integrated examination allows us to both identify how exploitation and exploration play out in the ambidextrous practices of an e-HRM project and also to identify the dimensions of ambidexterity in balancing e-HRM work
Malicious User Experience Design Research for Cybersecurity
This paper explores the factors and theory behind the user-centered research
that is necessary to create a successful game-like prototype, and user
experience, for malicious users in a cybersecurity context. We explore what is
known about successful addictive design in the fields of video games and
gambling to understand the allure of breaking into a system, and the joy of
thwarting the security to reach a goal or a reward of data. Based on the
malicious user research, game user research, and using the GameFlow framework,
we propose a novel malicious user experience design approac
The organizational design of nonprofits for people with disabilities
Utilizando información obtenida de los directivos de 105 pequeñas organizaciones sin fines de lucro españolas
que, en el año 2007, se dedicaban a la prestación de servicios a personas con discapacidad, hemos analizado
como el diseño organizativo –en concreto, los sistemas de recompensas extrínsecas e intrínsecas- influye sobre la
delegación, la motivación y la transferencia de conocimiento a la hora de lograr el objetivo de la organización
consistente en mejorar la calidad de vida de las personas que viven con una discapacidad. Los resultados
muestran que, debido a la carencia de conocimiento técnico, los directivos de estas entidades no lucrativas
(ENL) deben delegar derechos de decisión en empleados cualificados y utilizar en mayor medida recompensas
intrínsecas y extrínsecas para motivar a los empleados a que transmitan conocimiento entre ellos eficientemente.We use data obtained from managers of 105 small nonprofit organizations (NPOs) providing services to people
with disabilities in Spain in 2007 to examine how organizational design—particularly, extrinsic and intrinsic
reward systems—impacts delegation, motivation, and knowledge transfer to achieve the NPO’s goal to improve
the lives of persons living with disabilities. We find that, due to lack of technical knowledge, managers of these
NPOs must delegate decision rights to qualified employees and that they successfully use a higher degree of
intrinsic and extrinsic rewards to motivate employees to transfer knowledge among themselves efficiently
Local flexibility market design for aggregators providing multiple flexibility services at distribution network level
This paper presents a general description of local flexibility markets as a market-based management mechanism for aggregators. The high penetration of distributed energy resources introduces new flexibility services like prosumer or community self-balancing, congestion management and time-of-use optimization. This work is focused on the flexibility framework to enable multiple participants to compete for selling or buying flexibility. In this framework, the aggregator acts as a local market operator and supervises flexibility transactions of the local energy community. Local market participation is voluntary. Potential flexibility stakeholders are the distribution system operator, the balance responsible party and end-users themselves. Flexibility is sold by means of loads, generators, storage units and electric vehicles. Finally, this paper presents needed interactions between all local market stakeholders, the corresponding inputs and outputs of local market operation algorithms from participants and a case study to highlight the application of the local flexibility market in three scenarios. The local market framework could postpone grid upgrades, reduce energy costs and increase distribution grids’ hosting capacity.Postprint (published version
End-to-End Privacy for Open Big Data Markets
The idea of an open data market envisions the creation of a data trading
model to facilitate exchange of data between different parties in the Internet
of Things (IoT) domain. The data collected by IoT products and solutions are
expected to be traded in these markets. Data owners will collect data using IoT
products and solutions. Data consumers who are interested will negotiate with
the data owners to get access to such data. Data captured by IoT products will
allow data consumers to further understand the preferences and behaviours of
data owners and to generate additional business value using different
techniques ranging from waste reduction to personalized service offerings. In
open data markets, data consumers will be able to give back part of the
additional value generated to the data owners. However, privacy becomes a
significant issue when data that can be used to derive extremely personal
information is being traded. This paper discusses why privacy matters in the
IoT domain in general and especially in open data markets and surveys existing
privacy-preserving strategies and design techniques that can be used to
facilitate end to end privacy for open data markets. We also highlight some of
the major research challenges that need to be address in order to make the
vision of open data markets a reality through ensuring the privacy of
stakeholders.Comment: Accepted to be published in IEEE Cloud Computing Magazine: Special
Issue Cloud Computing and the La
Reasons for failure of web-based application IT projects – An Empirical Study in Malaysia
Setiap tahun, organisasi rugi berjuta-juta ringgit kerana aplikasi berasaskan sesawang teknologi maklumat projek gagal.
Every year, organizations lose millions of dollars due to failure of web-based application information technology (IT) projects
Work Matters for Health
Provides an overview of how physical and mental health is affected by work -- the physical environment, psychosocial aspects, wages and benefits, and the need to balance responsibilities. Summarizes promising work-based strategies to improve health
Reasons for failure of web-based application IT projects – An Empirical Study in Malaysia
Setiap tahun, organisasi rugi berjuta-juta ringgit kerana aplikasi berasaskan sesawang teknologi maklumat projek gagal.
Every year, organizations lose millions of dollars due to failure of web-based application information technology (IT) projects
- …